Microsoft: Big Security Hole in All IE Versions

On Wednesday, Security Fixwarned readers about a newly-discovered security hole in Internet Explorer 7. I'm posting this again because Microsoft now says the flaw affects all supported versions of IE, and because security experts are warning that a large number of sites are being compromised in an effort to exploit this vulnerability and install malware on vulnerable systems.

The SANS Internet Storm Centerreports that hackers are breaking into legitimate Web sites and uploading code that could install data-stealing software on the machine of a user who visits the site using Internet Explorer. SANS's chief technology officer Johannes Ullrich estimates that thousands of sites have been seeded with this exploit to date.

For example, Web security firm Websense reports that hackers have compromised the Chinese Web site for ABIT, the maker of motherboards that power many home computers. So far, the exploits appear to be only stealing online gaming credentials, but SANS and others warn that attackers will likely use this exploit more deftly in the coming days and weeks.

According to Microsoft's revised security advisory, this flaw is present in every version of IE in use today, from IE5 all the way through to IE8 Beta 2.

Microsoft's advisory includes a host of recommendations for mitigating the threat from this vulnerability. Some of the company's suggestions did not work when I tried them on my Windows Vista system, or did not work without some tweaking that was not mentioned in the advisory.

For instance, Microsoft recommends enabling a feature called "data execution prevention," by clicking "Tools," "Internet Options," then "Advanced," and then checking the box next to that option. However, when I tried to make the changes in IE7 on Vista, I found that option grayed out. To make that change, I had to close out of IE completely, then right click on the IE icon, select "Run as Administrator," and then alter the setting.

Microsoft also suggests shifting IE's Internet and local Intranet security settings to "high." No problems changing that per Microsoft's instructions, except that few sites will load properly in IE because changing that setting disables active scripting, a feature that many Web sites use.

In addition, Microsoft says users can mitigate the threat from this flaw by de-registering the vulnerable component, a system file called "oledb32.dll". To do this, users need to run the Windows command prompt as administrator (to open a command prompt, click "Start" then Run, then type "cmd.exe"), and type or cut-and-paste the following command:

This generated an error message on my Windows Vista machine, complaining that the action could not be performed. The command worked fine on my Windows XP system.

I would advise Windows users to consider browsing the Web with anything other than Internet Explorer, at least until Microsoft issues a patch to fix this vulnerability. It is not my intention to over-hype the situation, but as we have seen time and again, attackers are usually very quick to take advantage of flaws in IE because the program is the default browser for close to 80 percent of the planet.

And don't count on your anti-virus program to save you from these types of attacks. A scan of the exploit being served up by several of the hacked sites produced atrocious results: VirusTotal.com reported that only four out of the 32 anti-virus programs it used to scan the malware detected it as malicious or suspicious.

I had a problem with the Regsvr32.exe command in XP SP3, but I solved it by running it _before_ I disabled oledb32.dll, then I disabled oledb32.dll. (Also, I had to switch to Opera to post this.) FWIW.

I don't see the "data execution prevention" in IE8's Advanced options. It is under "Security" in IE8? I do have a DEP setting "on" in XP though (Start > Control Panel > System > Advanced > Performance). Is this the same? I have been getting DEP warning but this has happened since installing IE8 Beta 2 when it came out.

OK, I just ran the command "Regsvr32.exe /u "%ProgramFiles%\Common Files\System\Ole DB\oledb32.dll". and got a success message. Do I need to do run the command each time I turn on the computer and I not, how do I turn it back on once the patch is issued?
Thanks!

First, this reporter has always done a pretty good job of not taking sides in which OS is better than others. If anything, Kreb's page is anti-internet explorer.

Second, the point of this particular column is to advise IE users on what to do in the short term. Switching browsers or following the MS advisory are obvious answers. Switching operating systems because of a browser problem (as you seem to suggest) is beyond overkill. Not to mention the fact that most people can't exactly stop on a dime and switch their OS.

DEP can be done through dos. In vista, right click the cmd icon>run as admin>paste the following command:
bcdedit.exe /set {current} nx AlwaysOn. I turned it off but recently re-enabled it. Thanks Brian.

Just wanted to let everyone know that SonicWall seems to be on the ball. My network is behind a TZ180 running OSEnhanced and the Gateway Antivirus is enabled for http (and all others). I tried to visit the chineese Abit site and was denied access to the site by the SonicWall Gateway Antivirus reporting and Exploit.

Also, as I was typing this, I tested the site from outside the firewall and Symantec Endpoint 11 Intrusion Prevention picked up on the attack reporting "HTTP MSIE Malfomed XML BO detected. Traffic has been blocked from this application: C:\Program Files\Internet Exploere\iexplore.exe" and the Active Response stated: "Traffic from IP address **** is blocked."

Obivously the hole still exists in IE, and many anti-virus solutions are reported to not pick up on the zero-day exploit attacks, but it's good to know that my LAN is protected.